Risk Scoring Based On Endpoint User Activities
First Claim
1. A computer implemented method of determining risk involved in activities performed by a user of resources of an organization, comprising the steps of:
- creating a plurality of group risk ranking profiles and security policies for usage of said resources of said organization, wherein said user is associated with one or more of said group risk ranking profiles;
tracking activities of the user in the organization by a security client application provided on a computing device of the user;
generating an end risk score for the user for each of said associated group risk ranking profiles, comprising the steps of;
assigning points to said tracked activities of the user based on each of the associated group risk ranking profiles, wherein said assigned points are aggregated to generate a first risk score; and
modifying said assigned points of the tracked activities of the user at different levels based on a plurality of predefined rules, wherein said modified points are aggregated to generate said end risk score;
whereby said generated end risk score determines said risk involved in said activities performed by the user in the organization.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed herein is a computer implemented method and system for ranking a user in an organization based on the user'"'"'s information technology related activities and arriving at an end risk score used for determining the risk involved in activities performed by the user and for other purposes. Group risk ranking profiles and security policies for usage of the organization'"'"'s resources are created. The user is associated with one or more group risk ranking profiles. A security client application tracks the user'"'"'s activities. Points are assigned to the user'"'"'s tracked activities based on each of the associated group risk ranking profiles. The assigned points are aggregated to generate a first risk score. The assigned points of the user'"'"'s tracked activities are modified at different levels based on predefined rules. The modified points are aggregated to generate the end risk score which is used for compliance and governance purposes, optimizing resources, etc.
397 Citations
21 Claims
-
1. A computer implemented method of determining risk involved in activities performed by a user of resources of an organization, comprising the steps of:
-
creating a plurality of group risk ranking profiles and security policies for usage of said resources of said organization, wherein said user is associated with one or more of said group risk ranking profiles; tracking activities of the user in the organization by a security client application provided on a computing device of the user; generating an end risk score for the user for each of said associated group risk ranking profiles, comprising the steps of; assigning points to said tracked activities of the user based on each of the associated group risk ranking profiles, wherein said assigned points are aggregated to generate a first risk score; and modifying said assigned points of the tracked activities of the user at different levels based on a plurality of predefined rules, wherein said modified points are aggregated to generate said end risk score; whereby said generated end risk score determines said risk involved in said activities performed by the user in the organization. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer implemented system for determining risk involved in activities performed by a user of resources of an organization, comprising:
-
a security client application on a computing device of said user, wherein said security client application comprises a tracking module for tracking activities of the user in said organization; a risk management server comprising; a group risk ranking profile creation module for creating a plurality of group risk ranking profiles and security policies for usage of said resources of the organization, wherein the user is associated with one or more of said group risk ranking profiles; a scoring engine for generating an end risk score for the user for each of said associated group risk ranking profiles, where said scoring engine comprises; a points assignment module for performing the steps of; assigning points to said tracked activities of the user based on each of the associated group risk ranking profiles; and modifying said assigned points of the tracked activities of the user at different levels based on a plurality of predefined rules; and a score aggregation module for aggregating said points assigned to the tracked activities of the user to generate a first risk score, and for aggregating said modified points to generate said end risk score; whereby said generated end risk score determines said risk involved in said activities performed by the user in the organization. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer program product comprising computer executable instructions embodied in a computer-readable medium, wherein said computer program product comprises:
-
a first computer parsable program code for creating a plurality of group risk ranking profiles and security policies for usage of resources of an organization; a second computer parsable program code for providing a security client application on a computing device of a user; a third computer parsable program code for tracking activities of said user in said organization using said security client application; a fourth computer parsable program code for assigning points to said tracked activities of the user based on each of the associated group risk ranking profiles; a fifth computer parsable program code for aggregating said assigned points to generate a first risk score; and a sixth computer parsable program code for modifying the assigned points of the tracked activities of the user at different levels based on a plurality of predefined rules, wherein said modified points are aggregated to generate an end risk score, wherein said generated end risk score is used to determine risk involved in activities performed by the user in the organization.
-
Specification